Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Columbus

Region: Ohio

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.19.60.240
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34471
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;148.19.60.240.			IN	A

;; AUTHORITY SECTION:
.			414	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020030200 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 02 18:45:40 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 240.60.19.148.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 240.60.19.148.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
200.159.250.2 attack
email spam
2019-12-17 16:18:57
165.90.60.73 attack
Absender hat Spam-Falle ausgel?st
2019-12-17 15:51:13
103.12.151.6 attack
Absender hat Spam-Falle ausgel?st
2019-12-17 16:01:49
178.217.40.208 attackspambots
Absender hat Spam-Falle ausgel?st
2019-12-17 15:49:49
185.186.81.250 attack
Absender hat Spam-Falle ausgel?st
2019-12-17 15:48:43
185.13.199.162 attackbotsspam
Absender hat Spam-Falle ausgel?st
2019-12-17 15:49:13
186.208.109.234 attack
Absender hat Spam-Falle ausgel?st
2019-12-17 15:46:34
134.209.63.140 attackbotsspam
2019-12-17T07:39:15.405092shield sshd\[29056\]: Invalid user junkman from 134.209.63.140 port 34578
2019-12-17T07:39:15.409186shield sshd\[29056\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.63.140
2019-12-17T07:39:16.980412shield sshd\[29056\]: Failed password for invalid user junkman from 134.209.63.140 port 34578 ssh2
2019-12-17T07:44:28.473457shield sshd\[30736\]: Invalid user asterisk from 134.209.63.140 port 43298
2019-12-17T07:44:28.477611shield sshd\[30736\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.63.140
2019-12-17 15:53:44
91.215.232.33 attackspambots
91.215.232.33 [91.215.232.33] - - [17/Dec/2019:15:39:50 +0900] "POST /cgi-bin/yybbs/yybbs.cgi HTTP/1.1" 406 249 "http://*.*.*/cgi-bin/yybbs/yybbs.cgi" "Mozilla/5.0 (Windows NT 6.1; rv:38.0) Gecko/20100101 Firefox/38.0 K-Meleon/76.0"
2019-12-17 16:05:20
92.242.126.154 attackbotsspam
Absender hat Spam-Falle ausgel?st
2019-12-17 16:03:56
195.206.4.16 attackspam
email spam
2019-12-17 16:19:50
103.243.81.252 attackbotsspam
proto=tcp  .  spt=58367  .  dpt=25  .     (Found on   Dark List de Dec 17)     (248)
2019-12-17 15:57:44
207.96.90.42 attack
Absender hat Spam-Falle ausgel?st
2019-12-17 15:41:40
87.197.137.223 attackspambots
Absender hat Spam-Falle ausgel?st
2019-12-17 16:05:55
138.255.14.29 attackspambots
Absender hat Spam-Falle ausgel?st
2019-12-17 15:53:17

Recently Reported IPs

192.30.241.187 85.168.159.53 82.241.92.158 58.85.56.13
215.205.31.149 88.182.10.78 57.216.120.238 79.127.110.231
85.126.81.243 93.23.152.155 148.73.238.128 204.47.62.138
109.38.100.193 76.61.201.41 45.153.202.215 84.29.1.177
8.83.56.144 154.81.44.12 53.201.162.181 58.249.99.126